0% found this document useful (0 votes)
107 views

Course Outline Information Security

This document outlines the course structure for an Information Security course. The course is 3 credit hours, with 2 hours of lecture and 1 hour of practical work. The course covers 6 units on topics such as security goals, attacks, encryption, digital signatures, network security, operating system security, malware, and firewalls. Student assessment includes assignments, lab exercises, quizzes, midterm and final exams. The textbook is "Network Security Essentials" and references include books on cryptography, network security, computer security basics, and modern cryptography.

Uploaded by

Jebesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views

Course Outline Information Security

This document outlines the course structure for an Information Security course. The course is 3 credit hours, with 2 hours of lecture and 1 hour of practical work. The course covers 6 units on topics such as security goals, attacks, encryption, digital signatures, network security, operating system security, malware, and firewalls. Student assessment includes assignments, lab exercises, quizzes, midterm and final exams. The textbook is "Network Security Essentials" and references include books on cryptography, network security, computer security basics, and modern cryptography.

Uploaded by

Jebesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

HARAMAYA UNIVERSITY

College of Computing and Informatics


Department of Software Engineering

Course Title: Information Security Course Code: SE4092


Course Structure: 3 Cr. Hrs. Lecture: 2Cr. Hrs. Practical: 1 Hr.
Prerequisites: Data Communication and Computer Networks
Instructor: Mr.Rajasekhar Boddu
Units Topic
1 Security Goals, Security Attacks (Interruption, Interception, Modification and Fabrication),
Security Services (Confidentiality, Authentication, Integrity, Non-repudiation, access
Control and Availability) and Mechanisms
2 A model for Internetwork security, Internet Standards and RFCs, Mathematical Tools
for Cryptography: Introduction to number theory, prime & relative numbers, modular
arthimetic, Fermat’s and Euler’s theorems, testing for primality, Chinese remainder
theorem, Discrete logarithms
3 Conventional Encryption Principles &Algorithms(DES, AES, RC4), Block Cipher
Modes of Operation, Location of Encryption Devices, Key Distribution, Public key
cryptography principles, public key cryptography algorithms(RSA, RABIN,
ELGAMAL, Diffie-Hellman, ECC), Key Distribution
4 Approaches of Message Authentication, Secure Hash Functions(SHA-512,
WHIRLPOOL) and HMAC - Digital Signatures: Comparison, Process- Need for Keys,
Signing the Digest, Services, Attacks on Digital Signatutres, Kerberos, X.509 Directory
Authentication Service
5 Network Management, Basic concepts of SNMP, SNMPv1 Community facility and
SNMPv3
OS Security, OS Security Functions, Separation, Memory Protection, Access Control,
Trusted Operating System: MAC, DAC, Trusted path, Trusted Computing Base
6 Viruses and related threats, Anatomy of Virus, Virus Counter Measures - Software
Flaws: Buffer Overflow, Incomplete Mediation, Race Conditions, Malware: Brain,
Morris Worm, Code Red, Malware Detection - Firewalls, Design principles, Types of
Firewalls, Firewall Architectures, Trusted Systems.

Assessment & Evaluation Methods


Assignment-10%, Lab Exercise-15%, Quiz-10%,Mid Exam-20%, Final Exam-45%

Texts and references:


Textbook:
Network Security Essentials (Applications and Standards) by William Stallings, Pearson Education.
Information Security Principles & Practice, Mark Stamp, WILEY INDIA 2006.

References
Cryptography and network Security, Fourth edition, Stallings, PHI/Pearson
Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
Computer Security Basics by Rick Lehtinen, Deborah Russell &G.T.Gangemi Sr., SPD O’REILLY
2006.
Modern Cryptography by Wenbo Mao, Pearson Education 2007.

You might also like